0% found this document useful (0 votes)
62 views11 pages

Face Recognition Voiting System Using Iot

This document describes a face recognition voting system using IoT. It was created by students at GITAM School of Technology under the guidance of Mrs. Beena G Pillai. The system uses a Raspberry Pi 3, fingerprint scanner, and Haar cascade algorithm for face recognition to provide two-factor authentication for voters. Embedded C is used to program the system. When a voter's fingerprint and face are verified against the stored database, they can cast their vote which is recorded on an SD card. The system aims to provide a more secure electronic voting method for India.

Uploaded by

Kittu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views11 pages

Face Recognition Voiting System Using Iot

This document describes a face recognition voting system using IoT. It was created by students at GITAM School of Technology under the guidance of Mrs. Beena G Pillai. The system uses a Raspberry Pi 3, fingerprint scanner, and Haar cascade algorithm for face recognition to provide two-factor authentication for voters. Embedded C is used to program the system. When a voter's fingerprint and face are verified against the stored database, they can cast their vote which is recorded on an SD card. The system aims to provide a more secure electronic voting method for India.

Uploaded by

Kittu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

GITAM School of technology

Department of Computer Science and Engineering


Bengaluru Campus

Face Recognition voiting system using


IoT

Under the guidance of,


Mrs.BEENA G PILLAI
Assistant professor

By:
BRUNDHA P (3210316803)
JAHNAVI RAM R (3210316817)
MANEESH S (3210316822)
PRASANNA Y (3210316806)
Contents
• Introduction
• Embedded C
• Haar cascade algorithm
• Components
• Finger print recognition
• Working

Department of Computer Science and


Engineering
INTRODUCTION
• In India two methods are used for voting. The first
method is secret ballot paper, in which lots of paper are
used and second method is EVM (electronic voting
machine) is used since 2003.
• In our project First level of verification is voter card
number and next we use finger print unit to access the
vote.
• Second level of security where the system recognize
the face of the real voter from the current database of
face images given by the election commission.
• Then a voter can cast their vote in the election.
Department of Computer Science and
Engineering
Embedded C
• Embedded C is a generic term given to a programming
language written in C, which is associated with a particular
hardware architecture.
• Embedded C is an extension to the C language with some
additional header files. These header files may change from
controller to controller.
• It is the soul of the processor functioning inside each and
every embedded system we come across in our daily life,
such as mobile phone, washing machine, and digital camera.

Department of Computer Science and


Engineering
Haar Cascade Algorithm
• The Algorithm we use in this project is Haar Cascade Classifier,
which is a method for detecting objects in an image.
• Here we will work with face detection. Initially, the algorithm
needs a lot of positive images (images of faces) and negative
images (images without faces) to train the classifier. Then we
need to extract features from it.
• The algorithm has four stages
1.Haar Feature selection
2.creating integral images
3.Adaboort training
4.cascading classifier Department of Computer Science and
Engineering
Components
• SD Card
• Raspberry pi-3
• Finger print unit
• 5v DC Adapter
• Power supply
• Acrylic sheets
• 5 key poll switch
• Jumper wires
Department of Computer Science and
Engineering
FINGER PRINT RECOGNITION

• Fingerprint recognition scanners are based on very similar


hardware principles and additional software play major role.
• Typically these algorithms look for where a ridge splits in two
or where ridges and lines end. Collectively, these and other
distinctive features are known as minutiae.
• If a scanned fingerprint matches several of these minutiae then
it will be considered as a match.
• It involves two main stages of operation.
1. Enrollment
2. Verification.

Department of Computer Science and


Engineering
• Enrollment: In this information about the user can be
scanned, analyzed and stored in the form of code in the
data base.
• Verification: In this anyone who wants to gain access has
to put their finger on a capacitance scanner.
• The scanner takes their fingerprint, and checks it against all
the prints in the database stored during enrollment, and
helps to decide
WORKING
References

1. Pandit, Varad, Prathamesh Majgaonkar, Pratik Meher,


Shashank Sapaliga, and Sachin Bojewar. "Intelligent security
lock." In Trends in Electronics and Informatics (ICEI), 2017
International Conference on, pp. 713-716. IEEE, 2017.
2. Chauhan, C. U., Abhishek Kalnawat, Akshay Aswale, Ujwal
Gautam, and Roshan Nemad. "Survey Paper on a Novel
Approach: Web Based Technique for Vote Casting."
International Journal of Engineering and Management
Research (IJEMR) 7, no. 5 (2017): 71GER, BARRY. "
3. Sundaram, Ravi. "The Postcolonial City in India. From
Planning to Information?." Techniques & Culture. Revue
semestrielle d’anthropologie desScience
Department of Computer techniques
and (2017).
Engineering
Queries

Department of Computer Science and


Engineering

You might also like